关注
Paul C. van Oorschot
Paul C. van Oorschot
Professor of Computer Science, Carleton University, Canada
在 scs.carleton.ca 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Handbook of Applied Cryptography
AJ Menezes, PC van Oorschot, SA Vanstone
CRC Press, 1996
24611*1996
Authentication and authenticated key exchanges
W Diffie, PC van Oorschot, MJ Wiener
Designs, Codes and Cryptography 2 (2), 107-125, 1992
17121992
The quest to replace passwords: A framework for comparative evaluation of web authentication schemes
J Bonneau, C Herley, PC van Oorschot, F Stajano
IEEE Symp. on Security and Privacy (Oakland 2012), 2012
14042012
Graphical passwords: Learning from the first twelve years
R Biddle, S Chiasson, PC van Oorschot
ACM Computing Surveys 44 (4), 19:1-41, 2012
9532012
Parallel collision search with cryptanalytic applications
PC van Oorschot, MJ Wiener
Journal of Cryptology 12 (1), 1-28, 1999
8941999
A methodology for empirical analysis of permission-based security models and its application to Android
D Barrera, HG Kayacik, PC van Oorschot, A Somayaji
ACM CCS 2010: Conf. on Computer and Communications Security, 73-84, 2010
7332010
White-box cryptography and an AES implementation
S Chow, P Eisen, H Johnson, P van Oorschot
Selected Areas in Cryptography (SAC 2003), 250-270, 2003
6562003
Graphical password authentication using cued click points
S Chiasson, P van Oorschot, R Biddle
ESORICS 2007: European Symp. on Research in Computer Security, 359-374, 2007
5132007
A white-box DES implementation for DRM applications
S Chow, P Eisen, H Johnson, P van Oorschot
ACM CCS Workshop on Digital Rights Management, 1-15, 2003
5102003
On unifying some cryptographic protocol logics
PF Syverson, PC van Oorschot
IEEE Symp. on Security and Privacy (Oakland 1994), 14-28, 1994
5101994
A research agenda acknowledging the persistence of passwords
C Herley, PC van Oorschot
IEEE Security & Privacy 10 (1), 28-36, 2012
3852012
MDx-MAC and building fast MACs from hash functions
B Preneel, P van Oorschot
CRYPTO’95: Advances in Cryptology, 1-14, 1995
3821995
Passwords and the evolution of imperfect authentication
J Bonneau, C Herley, PC van Oorschot, F Stajano
Communications of the ACM 58 (7), 78-87, 2015
3592015
A usability study and critique of two password managers
S Chiasson, PC van Oorschot, R Biddle
USENIX Security 2006: 15th USENIX Security Symposium, 1-16, 2006
3552006
SoK: SSL and HTTPS: Revisiting past challenges and evaluating certificate trust model enhancements
J Clark, PC van Oorschot
IEEE Symp. on Security and Privacy (Oakland 2013), 2013
3432013
Human-seeded attacks and exploiting hot-spots in graphical passwords
J Thorpe, PC van Oorschot
USENIX Security 2007: 16th USENIX Security Symposium, 2007
3102007
Influencing users towards better passwords: persuasive cued click-points
S Chiasson, A Forget, R Biddle, PC van Oorschot
BCS-HCI 2008: Proc. 22nd British HCI Group Annual Conference on People and …, 2008
2962008
Multiple password interference in text and click-based graphical passwords
S Chiasson, A Forget, E Stobert, P Van Oorschot, R Biddle
ACM CCS 2009: Conf. on Computer and Communications Security 11, 2009
289*2009
Method and apparatus for correcting improper encryption and/or for reducing memory storage
L Dilkie, PC Van Oorschot
US Patent 6,341,164, 2002
2822002
An Introduction to Error Correcting Codes with Applications
SA Vanstone, PC van Oorschot
Kluwer Academic Publishers, 1989
273*1989
系统目前无法执行此操作,请稍后再试。
文章 1–20